{"id":82220,"date":"2016-11-26T20:57:16","date_gmt":"2016-11-27T01:57:16","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-04-05T17:24:27","modified_gmt":"2021-04-05T21:24:27","slug":"reducing-your-linkedin-risks","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/reducing-your-linkedin-risks\/","title":{"rendered":"Reducing Your LinkedIn Risks"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20170309210141\/https:\/\/wraysec.com\/social-engineering-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-98001\" title=\"Reducing Your LinkedIn Risks\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/social-engineering-security.png?resize=112%2C100&#038;ssl=1\" alt=\"Reducing Your LinkedIn Risks\" width=\"112\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/social-engineering-security.png?resize=150%2C134&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/social-engineering-security.png?resize=75%2C67&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/social-engineering-security.png?resize=768%2C686&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/social-engineering-security.png?resize=1024%2C914&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/social-engineering-security.png?w=1167&amp;ssl=1 1167w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/social-engineering-security.png?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 112px) 100vw, 112px\" \/><\/a>Microsoft\u2019s recent <strong>purchase of LinkedIn<\/strong> has pushed the struggling <a href=\"https:\/\/www.linkedin.com\/pulse\/linkedin-we-really-turning-facebook-ayman-fattah-pgmp-pmp-cip\" target=\"_blank\" rel=\"noopener noreferrer\">ersatz<\/a> professional networking site back into the limelight. There is plenty of speculation why <a title=\"Microsoft\" href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a title=\"NASDAQ | MSFT\" href=\"https:\/\/www.google.com\/finance?cid=358464\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) purchased the site for over $2.6 billion. Undoubtedly it has to do with <a title=\"LinkedIn\" href=\"https:\/\/www.linkedin.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn&#8217;s<\/a> (<a title=\"NYSE : LNKD\" href=\"https:\/\/www.google.com\/finance?cid=13210501\" target=\"_blank\" rel=\"noopener noreferrer\">LNKD<\/a>) cache of over <strong>430 million online users<\/strong>. Whatever Redmond\u2019s designs are, now is probably a good time to check LinkedIn security to reduce your LinkedIn risks.<\/p>\n<p><strong><a href=\"http:\/\/www.linkedin.com\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-98015 alignright\" title=\"LinkedIn logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/logo_linkedin-1.png?resize=125%2C30&#038;ssl=1\" alt=\"LinkedIn logo\" width=\"125\" height=\"30\" \/><\/a>Attackers<\/strong> have long used social networking as part of their <strong>reconnaissance activities<\/strong>. They cull personal information posted on the site to craft <strong>targeted attacks<\/strong> that have a higher chance of succeeding. The cyber-criminals rely on the fact that people tend to trust people within their personal network.Their targets are more likely to fall for a <strong><a title=\"Phishing\" href=\"http:\/\/en.wikipedia.org\/wiki\/Phishing\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">spear phishing<\/a><\/strong> email if it appeared to come from a fellow member. The victims would also be more likely to visit a website if a member of their network suggested it.<\/p>\n<h3>LinkedIn risks<\/h3>\n<p>The fake LinkedIn profiles &#8220;significantly increase&#8221; the likelihood that these <strong>social engineering attacks<\/strong> will work according to research by Dell <a title=\"SecureWorks\" href=\"https:\/\/www.secureworks.com\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">SecureWorks<\/a>. The SecureWorks article <a href=\"https:\/\/www.secureworks.com\/research\/suspected-iran-based-hacker-group-creates-network-of-fake-linkedin-profiles\" target=\"_blank\" rel=\"noopener noreferrer\">describes<\/a> how attackers use <strong>fake LinkedIn profiles<\/strong>. Most of these fake accounts follow a <strong>specific pattern<\/strong>:<\/p>\n<ol>\n<li><a href=\"https:\/\/www.tripwire.com\/state-of-security\/security-awareness\/confessions-of-a-linkedin-imposter-we-are-probably-connected\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98002\" title=\"LinkedIn Risks\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imposter-e1563623938766-150x129.png?resize=92%2C79&#038;ssl=1\" alt=\"LinkedIn Risks\" width=\"92\" height=\"79\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imposter-e1563623938766.png?resize=150%2C129&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imposter-e1563623938766.png?resize=75%2C65&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imposter-e1563623938766.png?w=501&amp;ssl=1 501w\" sizes=\"auto, (max-width: 92px) 100vw, 92px\" \/><\/a>They bill themselves as <strong>recruiters for fake firms<\/strong> or are supposedly self-employed. Under the guise of a recruiter, the attackers have an easy entry point into the networks of real business professionals. Real recruiters already use the service as a way to find potential candidates. LinkedIn users expect to be contacted by recruiters, so this ruse works out in the scammers\u2019 favor.<\/li>\n<li>They primarily use <strong>photos of women pulled from stock image sites<\/strong> or of real professionals. Many of the fake LinkedIn accounts use unoriginal photographs. Their profile photos were found on stock image sites, other LinkedIn profiles, or other <a title=\"Social networking service\" href=\"http:\/\/en.wikipedia.org\/wiki\/Social_networking_service\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">social networking sites<\/a>.<\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20231231154448\/https:\/\/www.lifehacker.com.au\/2015\/11\/we-talked-to-an-ethical-hacker-heres-what-we-learned\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98003 \" title=\"reconnaissance activities\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-e1563623872490-150x114.jpg?resize=106%2C80&#038;ssl=1\" alt=\"\" width=\"106\" height=\"80\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-e1563623872490.jpg?resize=150%2C114&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-e1563623872490.jpg?resize=75%2C57&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-e1563623872490.jpg?resize=768%2C585&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers1-e1563623872490.jpg?w=775&amp;ssl=1 775w\" sizes=\"auto, (max-width: 106px) 100vw, 106px\" \/><\/a>Attackers <strong>copy text from profiles of real professionals. <\/strong>They then paste it into their own. The text used in the Summary and Experience sections were usually lifted verbatim, from real professionals on LinkedIn.<\/li>\n<li>They <strong>keyword-stuff their profile<\/strong> for visibility in search results. Fake LinkedIn accounts stuff their profiles with keywords to gain visibility in to specific industries or firms.\u00a0 <a title=\"Northrop Grumman\" href=\"https:\/\/www.northropgrumman.com\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Northrup Grumman<\/a> and <a title=\"Airbus Group\" href=\"https:\/\/www.airbus.com\/en\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Airbus Group<\/a> are popular.<\/li>\n<\/ol>\n<p>The primary goal of these fake LinkedIn accounts is to map out the networks of business professionals. Using these fake LinkedIn accounts, scammers can <strong>establish a sense of credibility<\/strong> among professionals to start further connections. The fake network was created to help <strong>attackers target victims via social engineering<\/strong>.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20170713104329\/https:\/\/www.sophos.com\/en-us\/press-office\/press-releases\/2005\/10\/va_dutchbotarrests.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98025 \" title=\"disguise it as a r\u00e9sum\u00e9 application\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyberthief.gif?resize=83%2C117&#038;ssl=1\" alt=\"disguise it as a r\u00e9sum\u00e9 application\" width=\"83\" height=\"117\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyberthief.gif?resize=106%2C150&amp;ssl=1 106w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cyberthief.gif?resize=53%2C75&amp;ssl=1 53w\" sizes=\"auto, (max-width: 83px) 100vw, 83px\" \/><\/a>In addition to mapping connections, scammers can also <strong>scrape contact information<\/strong> from their connections. The attackers collect personal and professional <strong>email addresses as well as phone numbers<\/strong>. This information could be used to <strong>send spear-phishing emails<\/strong>.<\/p>\n<p><b><\/b>LinkedIn cyber-thieves <a href=\"https:\/\/www.baselinemag.com\/security\/is-your-linkedin-profile-at-risk.html\" target=\"_blank\" rel=\"noopener noreferrer\">use<\/a> TinyZbotmalware (a password stealer, keystroke logger, multifunctional Trojan) and disguise it as a r\u00e9sum\u00e9 application. The Dell researchers advise organizations to educate their users of the specific and general LinkedIn risks in their report:<\/p>\n<ul>\n<li>Avoid contact with known fake personas.<\/li>\n<li>Only connect with people you know and trust.<\/li>\n<li>Use caution when engaging with members of colleagues&#8217; or friends&#8217; networks that they have not verified outside of LinkedIn.<\/li>\n<li>When evaluating employment offers, confirm the person is legitimate by directly contacting the purported employer.<\/li>\n<\/ul>\n<h3>Reduce your risks<\/h3>\n<p>There are a few ways users can identify fake LinkedIn accounts:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.tineye.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98000 \" title=\"search engine\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robot-search.png?resize=100%2C123&#038;ssl=1\" alt=\"search engine\" width=\"100\" height=\"123\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robot-search.png?resize=122%2C150&amp;ssl=1 122w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robot-search.png?resize=61%2C75&amp;ssl=1 61w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/robot-search.png?w=129&amp;ssl=1 129w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>Do a <strong>reverse-image search<\/strong>. Tineye.com\u00a0<a href=\"https:\/\/web.archive.org\/web\/20170105203930\/https:\/\/www.tineye.com\/plugin\">offers a browser plugin<\/a> or use Google\u2019s Search by Image to confirm the in picture is legit.<\/li>\n<li>Copy and\u00a0<strong>paste profile information into a search engine<\/strong> to find real profiles.<\/li>\n<li>If someone you know is already connected with one of these fake accounts, reach out to them and find out how they know them.<\/li>\n<li>If you suspect that you\u2019ve identified a fake LinkedIn account, you should report it.<\/li>\n<\/ul>\n<p>LinkedIn <a href=\"https:\/\/web.archive.org\/web\/20200428040404\/https:\/\/www.pandasecurity.com\/mediacenter\/social-media\/fake-linkedin-profiles\/\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <a href=\"http:\/\/www.pandasecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Panda Security<\/a>:<\/p>\n<p style=\"padding-left: 60px;\"><em>We investigate suspected violations of our Terms of Service, including the creation of false profiles, and take immediate action when violations are uncovered. We have a number of measures in place to confirm authenticity of profiles and remove those that are fake. We urge members to <b>use our Help Center<\/b> to report inaccurate profiles and specific profile content to LinkedIn<\/em>.<\/p>\n<p>As always, it pays to be careful with information that you share online as it can save you many potential problems in the future.<\/p>\n<p>Here are some tips to keep your LinkedIn experience as secure as possible. <strong>Update Privacy Settings<\/strong> to understand how you&#8217;re sharing information. Smart options include:<\/p>\n<ul>\n<li><strong><a href=\"http:\/\/www.thegreenmarketoracle.com\/2011\/04\/social-media-is-mobilizing-youth-vote.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-97999 \" title=\"Apathy\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/socialmediacombatingvoterapathy.gif?resize=138%2C175&#038;ssl=1\" alt=\"Apathy\" width=\"138\" height=\"175\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/socialmediacombatingvoterapathy.gif?resize=118%2C150&amp;ssl=1 118w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/socialmediacombatingvoterapathy.gif?resize=59%2C75&amp;ssl=1 59w\" sizes=\"auto, (max-width: 138px) 100vw, 138px\" \/><\/a>Turn your activity broadcasts on or off<\/strong>. If you don&#8217;t want your connections to see when you change your profile, follow companies or recommend connections, uncheck this option.<\/li>\n<li><strong>Select what others can see<\/strong> when you&#8217;ve viewed their profile. When you visit other profiles on LinkedIn, those people can then see your name, photo, and headline. If you want more privacy, display anonymous profile information or show up as an anonymous member.<\/li>\n<li><strong>Select who can see your connections<\/strong>. You can share your connections&#8217; names with your other first-degree connections, or you can make your connections list visible only to you.<\/li>\n<li><strong>Change your profile photo and visibility<\/strong>. You can choose to have your photo displayed only to your first-degree connections, only to your network, or to everyone who views your profile.<\/li>\n<\/ul>\n<p>Opt into <strong><a title=\"Multi-factor authentication\" href=\"http:\/\/en.wikipedia.org\/wiki\/Multi-factor_authentication\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">Two-Step Verification<\/a><\/strong> to prevent other people from accessing your account. LinkedIn lets members turn on two-step verification for their accounts. This will require an account password and a numeric code sent to your phone when you attempt to sign in from a device your account doesn\u2019t recognize.<\/p>\n<p>Opt into <strong>Secure Browsing<\/strong> for extra protection against unauthorized access to your Internet activity and to make sure you&#8217;re connected to the real LinkedIn website. While LinkedIn automatically secures a connection when you\u2019re on certain pages that require sensitive information, you also have the option to turn on this protected connection when viewing any page.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.businessinsider.com\/russia-bans-linkedin-court-ruling\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Russia has banned LinkedIn (LNKD)<\/a> (businessinsider.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a>\u00a0about IT, careers and anything else that catches his attention since 2005. You can follow him at\u00a0<a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Be careful consider linkedIn risks attackers can use your LinkedIn profile to steal PII phish &#038; drop malware<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2686,125,536,92,317,696,2816,82,421,612,4],"class_list":["post-82220","post","type-post","status-publish","format-standard","hentry","category-security","tag-2686","tag-data-breach","tag-goog","tag-google","tag-linkedin","tag-lnkd","tag-merger","tag-microsoft","tag-msft","tag-phishing","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/82220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=82220"}],"version-history":[{"count":15,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/82220\/revisions"}],"predecessor-version":[{"id":132597,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/82220\/revisions\/132597"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=82220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=82220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=82220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}